Sciweavers

22698 search results - page 4213 / 4540
» Modeling in Software Engineering
Sort
View
ISW
2007
Springer
15 years 10 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
ICDM
2006
IEEE
76views Data Mining» more  ICDM 2006»
15 years 10 months ago
How Bayesians Debug
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault localization in both software engineering and data mining communities. Fault l...
Chao Liu 0001, Zeng Lian, Jiawei Han
ISPD
2006
ACM
175views Hardware» more  ISPD 2006»
15 years 10 months ago
mPL6: enhanced multilevel mixed-size placement
The multilevel placement package mPL6 combines improved implementations of the global placer mPL5 (ISPD05) and the XDP legalizer and detailed placer (ASPDAC06). It consistently pr...
Tony F. Chan, Jason Cong, Joseph R. Shinnerl, Kent...
ISSTA
2006
ACM
15 years 10 months ago
An empirical study of the robustness of MacOS applications using random testing
We report on the fourth in a series of studies on the reliability of application programs in the face of random input. Over the previous 15 years, we have studied the reliability ...
Barton P. Miller, Gregory Cooksey, Fredrick Moore
NETGAMES
2006
ACM
15 years 10 months ago
Meeting technology challenges of pervasive augmented reality games
Pervasive games provide a new type of game combining new technologies with the real environment of the players. While this already poses new challenges to the game developer, requ...
Wolfgang Broll, Jan Ohlenburg, Irma Lindt, Iris He...
« Prev « First page 4213 / 4540 Last » Next »